Honestly I love the way you teach, I've been watching your videos even before I get certified and you helped me a lot with your content for the exam, I hope one day to be as skilled as you
Woah, I just randomly found this video in my recommended, and after listening to you for a bit I realized "Holy Crap, I'm taking this mans CCNA course on Udemy" Amazing course btw!
Just purchased your CCNA course. I first completed CCNA and CWNA back in 2005.. it's been a while. Your course looks very well structured and looks practical/interactive. For $10 bux I highly recommend it. Will post more feedback after I've completed it.
I honestly didn’t think this was possible it took me like forever to figure something out, tried different ways to get back my IG acct That was blocked a long time ago but no one was able to help , my friend told me to try @crowns_hack23 on Instagram and so I did Great news! It worked!!! If you’ve been looking for a way to get yours back, don’t fail to reach out to , he is really amazing 🤩
Great video, well done David! I started to use yersinia and macoff as an ethical hacking tools, collecting logs in 2015. One of my customers didn't believe that someone could stop his network. We scheduled a non business hour and I flooded his network with more than 65000 mac addresses using two simple linux. His switches collapsed within mac moves notifications. Even his uplinks and downlinks entered in error-disable mode. There was upon a time when dot1x came out to play...
David, you are a master at explaining complex topics thoroughly yet with such concision. Very easy to follow along & you have such a wealth of knowledge. Thank you for taking the time to post these videos on ethical hacking techniques to help people, such as myself, protect their personal IT environment.
@@natural......9963 It's automatic because I have a membership with David Bombal ($1.99/mo). It's like Patreon, but through RUclips. Other plans are available, each with specific perks. I've learned a lot from his videos & David's time is of value to me. When I thought about how much I spend on books (that take hour[s] to absorb) versus watching a 30-min video demo, the $2 seems a pittance. Notice the comments to his videos: they are overwhelmingly positive & full of gratitude. Thanks.
It has been one of the most meaningful videos, God bless you for the information you have given, you are a perfectly knowledgeable and intelligent person. Living at the same time with you gives me great pleasure.
aww god i recognize this voice from the endless hours of CCNA study you damn near killed me with that monotone voice....but thank you so much i passed my exam hahaha
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
finally, someone who isnt cringe and actually knows wtf they are talking about!!! thank you!! ive been wanting to learn this for so long and nothing ever worked until i found your channel thank you so much!!!!
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
David . Thank you so much , you really know how to explain hacking matters. The only one, other channels (I am not saying any names),they don't really teach you much and we the "Students" , don't learn pretty much anything that could be applied to the real world
Just passed my CompTIA Network+ last month and I'm glad I was able to follow along (for the most part). Saw some new Cisco protocols that weren't covered in Network+, I didn't know CDP? Have to look those up along with the program tools. Obviously Cisco proprietary protocols. With so many Kali tools it was good to see a list of them on tools.kali.com. Now I can go and research all of them and see what's available. Awesome content, and don't be afraid to plug your courses. You put out the best explanations and walk throughs.
Easy & effective. I've been learning ethical hacking for a long time so that's nice to come back and see Yersinia. I'm looking forward to see more videos from you.
I became interested in hacking due to boredom during the pandemic. I did some research. Found Kali. Downloaded it with someone’s instructions ( won’t name you tubers name). Then had to delete it along with the VM. Did this about 3 times until I found you and the dude with the beard. 🤔.... forgot his name. Something chuck. Point is thank you both so very much for allowing me, which had no computer knowledge whatsoever, I mean, I would create a profile and immediately couldn’t log back in. Lol. Thanks guys
@@davidbombal Lol I learned a long time ago when going for my CCNA to create a separate network for my lab environment. As yes, I use to get yelled at constantly by the wife when the internet would go down.
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
You're amazing David! Thanks so much sir. I am enjoying and learning so much from you. You make it so enjoyable to learn all these new technologies. Many blessings.
I'm studying for CCNA...and this is an awesome video. Now I really understand why I need to networking knowledge to be a hacker. I didn't know STP hack before. That's awesome too. Thanks David.
im having an issue with yersinia. i cant use -G for the gui and there is no error message or anything . im using vmware workstation 17 running kali linux 2023.3 please help Thankyou
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
Hello David! Thank you for this course! I'm an application security tester learning infrastructure hacking to conduct full pentest engagements. This is great help for me to move forward in my career! Question is there a way you can create this lab without a Cisco switch? Can this be done with GNS3 and configure it as a Cisco Network?
Loving the "Afrikaans" accent thanks David !!! David im currently in the Insurance Industry , what will be the best way for me to get into the IT Sec industry in SA? Warmest regards and keep up the great work!
Thank you JC. I have lived in the UK for many years. Not sure about the dynamics and best options in South Africa. But, I suggest you try networking with people in the industry locally via LinkedIn or going to meetups and the like.
This topic is super complex for beginners ! wished an explanation to the network protocols as that is super advanced for the first video after kali installation
Assuming you can get physical access to an unsecured switch.... anyone with security that poor deserves to get hacked. Still, a useful tutorial for network admins who want to make sure their networks are hardened. Thank you.
Agree with Abdi's comment. Having programming knowledge is always an advantage. Start with the basics and then build on that knowledge. Remember that everyone at one point in their lives didn't know anything about networking or hacking. Everyone had to learn.
0- Mindset Hacker Pensar Fora Da Caixa 1- Lógica De Programação 2- Linguagem C & C++ & Python 3- Web & Rede De Computadores 4- Sistemas Operacionais Linux & Windows 5- Conhecer Vulnerabilidades.
Can someone please tell me what accent this great man has? I would like to know. English is not my native language, I just learn it. And this man has such a clear pronunciation and a pleasant voice!
finally somebody shows a realistic looking rack room in his intro. Whenever anybody shows a rack room it usually looks like a goddamn ufo spaceship. Reality is usually a jungle of cat5 and fiber
Not sure if you still read these but I tried to load yersinia with the "yersinia -G" and it doesn't do anything. No error message, nothing. Any idea why it would behave like that? The -h prompt works as it should
apparently you need an external USB adaptor now to make it work using yersinia, there's nothing that can be done about this, from my knowledge. I don't know much about this either as i am a beginner myself.
hello, i have loved your video so far, but i am having problems with installing yersinia. this is what happens when i tried it. my kali linux is the 2020 version. kali@kali:~$ sudo apt-get install yersinia Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package yersinia it seems weird that i had to type 'sudo' before certain commands, and i dont know what that means. i have a really strong will to become a hacker, but i am absolutely clueless about computer programming and i know nothing about hacking. im really interested in this topic and would like to learn more about it. could you please further explain about the commands you used? e.g. what does 'apt-get' do and where else can i use this command? what does 'sudo' means? also it would mean a lot to me if you could tell me more about how to become a hacker. where should i start? which programming language should i learn first? sorry that i have a lot of questions, but i am generally intrigued, could you please tell me more? finally, thanks a lot for these videos, they are very clear and if i do a bit of research, even a dumb dumb like me is able to understand. keep up with the videos! i love them.
sudo means that you need to ask for permission to do certain functions as you are not a root user. you will not be a default root user in kali linux 2020
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
hey David h r u, thanks for your videos on Ethical hacking. I learn a lot. It is my humble request to you please bring one complete series on Ethical hacking from scratch to Pro. I hope you will.
I have every reasons to do what I had to do if you were in my shoes! I couldn’t take it any longer, I had spent over thousands of dollars on medication but she couldn’t stop. She was a drug addict, I realized a bit late through her text messages and recent call records to different hard drug dealers. She had gotten to the point of selling them for a living and I noticed she’s always spending lavishly and never thought of our kids and I thought that was enough until she brought a man to our bed while I was away to satisfy her sexual urge. I got all the information from her through the great service of *ONE HACkER WHITE on IG, WhatsApp +1424-254-8116* I won’t have known if I didn’t take this bold step. I ended everything when we got to court with the concrete evidence I got! I’m happy to live a life without her unnecessary act
idk why most advertising or tutorials about ethical hacking has people who wears this kind masks, i mean, hollywood hurt people so bad lol But this is a nice tutorial i love him, i follow you from udemy.
@@davidbombal that could be right hahha master david, but im not agree people reffers to hackers with people with masks xD, but is the stereotype, i follow 70% of your courses, they're really nice david, thank you for share your knowledge.
I am teaching concepts in this video and have privilege 15 access (or root as you say) to demonstrate concepts. However, that level of access is not required to successfully launch a lot of the Yersinia hacks like CDP, VTP, STP or DHCP etc. These are layer 2 attacks that do not require any type of user authentication or authorization. Best practice would be to enable root guard, port security, dynamic ARP inspection, DHCP snooping and other mitigation techniques. The videos in this series teach why those types of protocols and mitigation techniques should be enabled.
@@davidbombal David Bombal my point is, you can confirm the attack is successful, how would an attacker know. And u know the switches setup with default config. Whether it be layer 1,2,3 core switch or even a layer 7 firewall you just flooding the switch with random traffic, which most Cisco's will disable that port and your "hacking" is being locally connected? . So the video then is mis titled hacking, I mean you could do the same with multiple computers doing a simple ping - l xxxxx. It's not hacking is all I'm saying, it's denial of service.
@@travismailsa1 When teaching concepts like these, I believe it is really important to demonstrate the results of the attacks. I would get a huge number of complaints if I didn't show the results of the attacks; and also set the foundation of what we are doing. This is also only one of the videos in the series and as I said in the video that it is getting too long, so I put more information in Part 2 and more in subsequent videos. I am showing attacks from the ground up - from initial installation in the first video in the series to more complex attacks. Probably best that we agree to disagree on this.
@@davidbombal I concur :) maybe change the video title, because that's why I came to watch. I thought it would of been a bug/firmware exploit or a Medusa or ripper attack from kali. Your video is well presented though. Finally :) if you teaching from the ground up and performing an "attack" locally advise on a Mac change.
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
Menu:
Overview: 0:00
Yersinia Overview: 0:58
Install Yersinia: 3:08
Yersinia options: 4:07
Run Yersinia: 4:40
Use Putty to view Switch configuration: 5:38
Bridge Kali Linux to the physical Ethernet network: 10:28
CDP flooding: 11:40
Spanning Tree (STP) hacking: 13:49
======================
Previous Video:
======================
Kali Linux installation video: ruclips.net/video/AnwgxRtWXLI/видео.html
======================
CCNA content:
======================
Free CCNA content: ruclips.net/p/PLhfrWIlLOoKM3niunUBTLjOR4gMt_uR_a
CCNA course: bit.ly/2PmTVPD
========================
Switch configuration:
========================
c2960-CG#sh run
Building configuration...
Current configuration : 2984 bytes
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname c2960-CG
!
boot-start-marker
boot-end-marker
!
enable password cisco
!
no aaa new-model
!
ip dhcp pool vlan1
network 10.1.1.0 255.255.255.0
default-router 10.1.1.254
dns-server 10.1.1.254
!
ip dhcp pool vlan2
network 10.1.2.0 255.255.255.0
default-router 10.1.2.254
dns-server 10.1.2.254
!
!
!
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
!
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
switchport access vlan 2
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet0/3
!
interface GigabitEthernet0/4
!
interface GigabitEthernet0/5
!
interface GigabitEthernet0/6
!
interface GigabitEthernet0/7
!
interface GigabitEthernet0/8
!
interface GigabitEthernet0/9
!
interface GigabitEthernet0/10
!
interface Vlan1
ip address 10.1.1.254 255.255.255.0
no ip route-cache
!
interface Vlan2
ip address 10.1.2.254 255.255.255.0
no ip route-cache
!
ip http server
ip http authentication local
ip http secure-server
!
!
!
!
line con 0
line vty 0 4
password cisco
login
transport input all
line vty 5 15
login
!
end
========================
Can you provide training to Nigeria Airforce cyber personnel?
Can you make a video showing is how to hack into social media’s such as Instagram??
@@santus3126 I don't provide face to face training unfortunately at the moment.
@@omeralmomani2310 I will investigate this and see if I can add a video to the series. For the moment, I am concentrating on network attacks.
David Bombal ok thank you
I LOVE the way of David talk. Loud, clear and very calm words. Im not a english expert, but i can absorve every word wich David tell´s us.
A tip for Linux beginners: if you aren't logged into root, you will have to type "sudo" (without the quotation marks) before your terminal command.
Thanks!
apt-get update
It’s working please help me out
It’s permission denied
Are you root ?
@@ykflims6068 because you are not a root run it as a root
Just open the root terminal
Thanks, it worked
Honestly I love the way you teach, I've been watching your videos even before I get certified and you helped me a lot with your content for the exam, I hope one day to be as skilled as you
Really glad to hear that Khris! I am just old and spent many years learning.
@@davidbombal just wanna say thank you, we appreciate your effort to bring us such content ❤️
@@davidbombal The best teacher on RUclips. Thank you so much
@@davidbombal How much of the CCNA course should I watch to learn to hack
David, you finally got me to sub with this video! Love you man! I'm in!
Thank you so much!!
This was a great demonstration, bringing together Kali/cybersecurity tools and Cisco/CCNA fundamentals and applying it in a lab scenario.
Woah, I just randomly found this video in my recommended, and after listening to you for a bit I realized "Holy Crap, I'm taking this mans CCNA course on Udemy" Amazing course btw!
Thank you! Appreciate the comment and the support :)
yup thats how i found him on youtube was i bought that course so reverse of what your doing... his CCNA is hands down the best udemy course ive seen.
I bought both courses on Udemy network fundamentals and the CCNA prep. Awesome.
i feel like this is the only hacking tutorial I'm comfortable watching
Glad you feel that way. I'm trying to teach network hacking practically and definitely legally :)
@@davidbombal thats why we like watching ur video..😁
Does it really work?
@@iradruki5669 yes
This is perfect than every one
Just purchased your CCNA course. I first completed CCNA and CWNA back in 2005.. it's been a while. Your course looks very well structured and looks practical/interactive. For $10 bux I highly recommend it. Will post more feedback after I've completed it.
Thank you for the support! Appreciate the comment.
i have only one word to say, and it's "EXCELLENT"
Thank you!
Oh god, a spam bot
I honestly didn’t think this was possible it took me like forever to figure something out, tried different ways to get back my IG acct That was blocked a long time ago but no one was able to help , my friend told me to try @crowns_hack23 on Instagram and so I did Great news! It worked!!! If you’ve been looking for a way to get yours back, don’t fail to reach out to , he is really amazing 🤩
tf are all the other words doing?
Great video, well done David! I started to use yersinia and macoff as an ethical hacking tools, collecting logs in 2015. One of my customers didn't believe that someone could stop his network. We scheduled a non business hour and I flooded his network with more than 65000 mac addresses using two simple linux. His switches collapsed within mac moves notifications. Even his uplinks and downlinks entered in error-disable mode.
There was upon a time when dot1x came out to play...
Great to see you putting out Kali-based material, David. Looking forward to the others!
Thank you John!
Him: *Teaches you how to hack*
Me: *Ends up hacking the Pentagon*
Him: "You weren't supposed to do that!"
lol... great comment. And exactly - do not hack the Pentagon or any network you are not authorized to hack.
@@davidbombal I'll take my chances
You remember me Wing commandar Abhinandan again..
Ricardo milos vs hackers
@@tgpro_craay4671 find out next time
David, you are a master at explaining complex topics thoroughly yet with such concision. Very easy to follow along & you have such a wealth of knowledge. Thank you for taking the time to post these videos on ethical hacking techniques to help people, such as myself, protect their personal IT environment.
How did you get that image by side of your user name
@@natural......9963 It's automatic because I have a membership with David Bombal ($1.99/mo). It's like Patreon, but through RUclips. Other plans are available, each with specific perks. I've learned a lot from his videos & David's time is of value to me. When I thought about how much I spend on books (that take hour[s] to absorb) versus watching a 30-min video demo, the $2 seems a pittance. Notice the comments to his videos: they are overwhelmingly positive & full of gratitude. Thanks.
The yersinia is not working in kali linux 23 the error is coming of not supported GTK
I'm having the same problem.
@@arfidev720 S
ame here. Does anyone have a solution yet?
love the video, graphics, talked in a clear voice and the information was all awesome but best of all, i loved his accent! :D
Not long got my Net+ currently studying Sec+ this is great information thank you
Congratulations on getting your Network+ and Security+ certifications. Glad the video was helpeful :)
hi
hi
Then did you Hack Net?
i found a nice place for my studies... just finished CCNA1 intro
Thank you. Hopefully you will learn a lot from my channel.
Why my yersinia don't "have GTK support" or "is configurated with --disable-gtk option"? How I can solve this?
same
I install using Virtual box instead and have the same problem
Our day is 24 hours and this video is 16 minutes that can change the rest of our life
“Thank you”
It ruined my life
I too watched it in 2020 about 6-7 months before
It has been one of the most meaningful videos, God bless you for the information you have given, you are a perfectly knowledgeable and intelligent person. Living at the same time with you gives me great pleasure.
Omg I’ve been waiting for this series on your channel for some time. Your content is amazing, I love your channel!
Thank you María! Really appreciate the support.
Great David! The best teacher ever!
Thank you!
I agree
aww god i recognize this voice from the endless hours of CCNA study you damn near killed me with that monotone voice....but thank you so much i passed my exam hahaha
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
finally, someone who isnt cringe and actually knows wtf they are talking about!!! thank you!! ive been wanting to learn this for so long and nothing ever worked until i found your channel thank you so much!!!!
This is a great tutorial for a programmer that jumps ship to cyber security.
This Guy is serious and so am I , first time activating youtube bell just for you man.
Thank you very much for the support Ráâfét
That’s great. I’m doing Master of Cybersecurity in University, but I think I would learn more from your channel 😁
Bro can I get ur numb
Hey, please can i know more about your University
How to access to Universities of Cyber Secirity in EU
Kushal Sorry I can not share my number, but if you have any questions I will answer you here
yhurj Khfn I’m not at EU, what would you like to know?
sounds great, can't wait to see the second part
Thank you Michael
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
David . Thank you so much , you really know how to explain hacking matters. The only one, other channels (I am not saying any names),they don't really teach you much and we the "Students" , don't learn pretty much anything that could be applied to the real world
i just installed kali linux,, any one who else in 2024 still viewing the video from david bombal ??
Yeah me... I'm a newbie to kali linux but I'll learn.
many learning channels on the internet, you are very good David. I love your effort for videos and good explaining.
Thank you!
Just passed my CompTIA Network+ last month and I'm glad I was able to follow along (for the most part). Saw some new Cisco protocols that weren't covered in Network+, I didn't know CDP? Have to look those up along with the program tools. Obviously Cisco proprietary protocols.
With so many Kali tools it was good to see a list of them on tools.kali.com. Now I can go and research all of them and see what's available.
Awesome content, and don't be afraid to plug your courses. You put out the best explanations and walk throughs.
Thank you Kenneth! Really appreciate the encouragement and support.
Easy & effective. I've been learning ethical hacking for a long time so that's nice to come back and see Yersinia. I'm looking forward to see more videos from you.
Thank you Nerino. I am teaching concepts from the ground up so people new to this can learn. Will get more complex as we progress.
I became interested in hacking due to boredom during the pandemic. I did some research. Found Kali. Downloaded it with someone’s instructions ( won’t name you tubers name). Then had to delete it along with the VM. Did this about 3 times until I found you and the dude with the beard. 🤔.... forgot his name. Something chuck. Point is thank you both so very much for allowing me, which had no computer knowledge whatsoever, I mean, I would create a profile and immediately couldn’t log back in. Lol. Thanks guys
Tried this on my home network with an old Cisco Catalyst 2960. Very cool to see it in action! Thanks for the great video, David.
Really glad to hear you tried this on your switch Brad. As long as you didn't get into trouble with the family for breaking your home network :)
@@davidbombal Lol I learned a long time ago when going for my CCNA to create a separate network for my lab environment. As yes, I use to get yelled at constantly by the wife when the internet would go down.
Absolutely amazing tutorial. Great work, please keep them coming.
Thank you very much!
Cyber_zest is the most accountable hacker i have came across during my quest to recover my lost instagram account
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
@@davidbombal jobs jj job are a 9 very j j8jjjj8j
You're amazing David! Thanks so much sir. I am enjoying and learning so much from you. You make it so enjoyable to learn all these new technologies. Many blessings.
You are very welcome Todd!
I'm studying for CCNA...and this is an awesome video. Now I really understand why I need to networking knowledge to be a hacker.
I didn't know STP hack before. That's awesome too. Thanks David.
Thank you for your videos, especially with Neil Bridges. You interview was very supportive to newbies joining the industry at later age. Thank you
I m a new learner and I love your way of teaching
I didn't usually comment on RUclips....but your videos....loving them..!!!!
Thank you so much Muhammed!
Ohh this is Great. Everyone should become hacker(White hat).😍
im having an issue with yersinia. i cant use -G for the gui and there is no error message or anything .
im using vmware workstation 17 running kali linux 2023.3
please help Thankyou
I really don't know what you are doing right now coz lm new. But all l can say is you are a very very good teacher
I'm waiting with impatience for the next part :)
Great! I believe that should be interesting to see a série of videos showing how to configure a web server against attacks.
Thank you for the suggestion Wagner
It was damn interesting man... I loved that hacking... waiting for your next videos...
Glad you enjoyed the video :) Next video is here:
ruclips.net/video/U3Wr2gfIUXM/видео.html
Cyber_zest is the most accountable hacker i have came across during my quest to recover my lost instagram account
hey, my yersenia dont open the graphical mode, someone can help me please?
do you find a way ?
@@Dandan-zi9hl no lol, never tried to use it again lol
Incredible David, your all videos are always very helpful for me. Thanks a lot for whatever you did till now, and expect more from you in future.
you are a legend i swear other people would have taught this in 2 hours
Thank you so much Mr David, your explanations are so easy to understand. Looking forward to new courses :=) Thanks again
Thank you Issam!
I am having problem while typing
sudo yersinia -G
What should i do?
did you find the answer?
@@Namballaramtarun yes. Just type admin. Or something like that wait I will find and reply back wait..
@@Namballaramtarun I have forgot that please wait for some time I will find let you know.
Very Good, Thanks
You are doing well. this is a good online course ever i have learned from.
Thank you Ahmad. Really happy to hear that :)
هلابي يالعربي
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
@@_tabot9268 🤫🤫 لا تفضحنا
Thanks for not being like my math teacher who can't teach anyone
You got a sub
One of the best online tutor 👍🤟
I love how this get the most views out of everything.
He is probably hacking us while we watch this right now
lol... make sure you are careful!
No is just a script kitty
@@Gringo_amigo We are all, using Nmap which is a prebuilt script which makes us script kiddies.
@@Gringo_amigo aha...and what are you?
@@arminharper510 am human what are you
I'm new to this knowledge of Ethical hacking and till time this video is most helpful..thanks sir..when is the next video up?
Thank you. Coming soon :)
Will be waiting!!
Great David, your videos contain all the information that I need. I appreciate what you do, thank you very much David.
this kind of videos encourages anyone to become a hacker! thank you
Hello David! Thank you for this course! I'm an application security tester learning infrastructure hacking to conduct full pentest engagements. This is great help for me to move forward in my career! Question is there a way you can create this lab without a Cisco switch? Can this be done with GNS3 and configure it as a Cisco Network?
yes this can be done by using vmware workstion
Gns3 can Cisco iOS , just virtually.. so yes it can be done..probably even better than using physical hardware.
Loving the "Afrikaans" accent thanks David !!!
David im currently in the Insurance Industry , what will be the best way for me to get into the IT Sec industry in SA?
Warmest regards and keep up the great work!
Thank you JC. I have lived in the UK for many years. Not sure about the dynamics and best options in South Africa. But, I suggest you try networking with people in the industry locally via LinkedIn or going to meetups and the like.
I'm waiting with impatience for the next Part. Greetings from Poland :)
Coming soon :)
This topic is super complex for beginners ! wished an explanation to the network protocols as that is super advanced for the first video after kali installation
Assuming you can get physical access to an unsecured switch.... anyone with security that poor deserves to get hacked. Still, a useful tutorial for network admins who want to make sure their networks are hardened. Thank you.
Hello I have a problome with the Yersinia , yersinia Gui is not open i can use but in CLI not Gui , Gui is not open please Help me.
Hey, David
Do I need to know how to code to be in cybersecurity filed / or to be a hacker?
Not necessarily but the more you know about coding the better you can create your own scripts instead of using pre made ones
Agree with Abdi's comment. Having programming knowledge is always an advantage. Start with the basics and then build on that knowledge. Remember that everyone at one point in their lives didn't know anything about networking or hacking. Everyone had to learn.
if you work app security engineer ,you need to lean html ,java script ,
If you don't code your programs, you're a script kiddy.
Clara Jane god no no don't you ruin you life can't you just simply ask him instead of crushing his privacy
this is great!
I'm in for the entire Series>!
great explanation . keep it up
Thank you Santiago! Hope you enjoy the entire series :)
From zero to Hero. thank you so much sir, looking forward for Part 2 :).
Im a mechanical engineering student lol, but i find this very very interesting, and you look highly highly professional sub from me!!!😀
I love your intro/theme song!! Best I have seen
Thank you Melinda!
0- Mindset Hacker Pensar Fora Da Caixa
1- Lógica De Programação
2- Linguagem C & C++ & Python
3- Web & Rede De Computadores
4- Sistemas Operacionais Linux & Windows
5- Conhecer Vulnerabilidades.
You are my admirable teacher.
Thank you!
Can someone please tell me what accent this great man has? I would like to know. English is not my native language, I just learn it. And this man has such a clear pronunciation and a pleasant voice!
finally somebody shows a realistic looking rack room in his intro.
Whenever anybody shows a rack room it usually looks like a goddamn ufo spaceship. Reality is usually a jungle of cat5 and fiber
0:10 which laptop it is name plz ?
i don't not know
Asus vivabook
I’ll let you know when I find out
Your video is awesome , thank you so much
Appreciate the support Khaled
[Everyone after watching this video]
"I'm gonna have to go into hardcore hacking mode"
Thanks!
Not sure if you still read these but I tried to load yersinia with the "yersinia -G" and it doesn't do anything. No error message, nothing. Any idea why it would behave like that? The -h prompt works as it should
same🥲. Have u had the answer yet?????
apparently you need an external USB adaptor now to make it work using yersinia, there's nothing that can be done about this, from my knowledge. I don't know much about this either as i am a beginner myself.
@@nan_x3 legendary thank you for the update
hello, i have loved your video so far, but i am having problems with installing yersinia. this is what happens when i tried it. my kali linux is the 2020 version.
kali@kali:~$ sudo apt-get install yersinia
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package yersinia
it seems weird that i had to type 'sudo' before certain commands, and i dont know what that means. i have a really strong will to become a hacker, but i am absolutely clueless about computer programming and i know nothing about hacking.
im really interested in this topic and would like to learn more about it. could you please further explain about the commands you used? e.g. what does 'apt-get' do and where else can i use this command? what does 'sudo' means?
also it would mean a lot to me if you could tell me more about how to become a hacker. where should i start? which programming language should i learn first?
sorry that i have a lot of questions, but i am generally intrigued, could you please tell me more?
finally, thanks a lot for these videos, they are very clear and if i do a bit of research, even a dumb dumb like me is able to understand. keep up with the videos! i love them.
sudo means that you need to ask for permission to do certain functions as you are not a root user. you will not be a default root user in kali linux 2020
Interesting contents and well explained . Thanks !
Thank you
I tbh dont get anything im just scaring my mom into giving me the tv remote
@Sienna West gg
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
I really like your topics, Thanks a lot Mr.David
hey David h r u, thanks for your videos on Ethical hacking. I learn a lot. It is my humble request to you please bring one complete series on Ethical hacking from scratch to Pro. I hope you will.
Me: about to go to bed
RUclips: Wanna learn how to hack?
I hack my girlfriend phone and now she broke up with me
ohh..no
xDDDDDDD
Can you help me in hacking bro please
Explanation plz
Cyber_zest is the most accountable hacker i have came across during my quest to recover my lost instagram account
Wow, i have seen 2 minutes of videos and i can hack girl's heart lol
Lol. Girls have got so advanced that they have their side Kali safeguarding them.
😂😆
Lol
😂😆
I have every reasons to do what I had to do if you were in my shoes! I couldn’t take it any longer, I had spent over thousands of dollars on medication but she couldn’t stop. She was a drug addict, I realized a bit late through her text messages and recent call records to different hard drug dealers. She had gotten to the point of selling them for a living and I noticed she’s always spending lavishly and never thought of our kids and I thought that was enough until she brought a man to our bed while I was away to satisfy her sexual urge. I got all the information from her through the great service of *ONE HACkER WHITE on IG, WhatsApp +1424-254-8116* I won’t have known if I didn’t take this bold step. I ended everything when we got to court with the concrete evidence I got! I’m happy to live a life without her unnecessary act
Gonna like and comment every Bombal video that is relevant to my learning track. That's all 'em, just about. (Deep breath...)
After watching this vlog I want to learn atleast something about hacking, thank you david sir!
Aqui é BRASIL 🇧🇷 VALEU AMIGO♧
Damn I love ur office
Thank you :)
I need a video of Instagram hacking please make a video on this topic
lol
@@jeroeng1025 🤦
Great information dear sir. I m inspire to learn this Networking best skill .
idk why most advertising or tutorials about ethical hacking has people who wears this kind masks, i mean, hollywood hurt people so bad lol
But this is a nice tutorial i love him, i follow you from udemy.
lol... yes...you have to dress a certain way - right?
@@davidbombal that could be right hahha master david, but im not agree people reffers to hackers with people with masks xD, but is the stereotype, i follow 70% of your courses, they're really nice david, thank you for share your knowledge.
Pretty useless video. you have root access to the switch
I am teaching concepts in this video and have privilege 15 access (or root as you say) to demonstrate concepts. However, that level of access is not required to successfully launch a lot of the Yersinia hacks like CDP, VTP, STP or DHCP etc. These are layer 2 attacks that do not require any type of user authentication or authorization. Best practice would be to enable root guard, port security, dynamic ARP inspection, DHCP snooping and other mitigation techniques. The videos in this series teach why those types of protocols and mitigation techniques should be enabled.
@@davidbombal David Bombal my point is, you can confirm the attack is successful, how would an attacker know. And u know the switches setup with default config. Whether it be layer 1,2,3 core switch or even a layer 7 firewall you just flooding the switch with random traffic, which most Cisco's will disable that port and your "hacking" is being locally connected? . So the video then is mis titled hacking, I mean you could do the same with multiple computers doing a simple ping - l xxxxx. It's not hacking is all I'm saying, it's denial of service.
@@davidbombal also in your guide, maybe teach the guys su/sudo apt-get update/upgrade/install.
@@travismailsa1 When teaching concepts like these, I believe it is really important to demonstrate the results of the attacks. I would get a huge number of complaints if I didn't show the results of the attacks; and also set the foundation of what we are doing. This is also only one of the videos in the series and as I said in the video that it is getting too long, so I put more information in Part 2 and more in subsequent videos. I am showing attacks from the ground up - from initial installation in the first video in the series to more complex attacks. Probably best that we agree to disagree on this.
@@davidbombal I concur :) maybe change the video title, because that's why I came to watch. I thought it would of been a bug/firmware exploit or a Medusa or ripper attack from kali. Your video is well presented though. Finally :) if you teaching from the ground up and performing an "attack" locally advise on a Mac change.
Love it.
Shortly before commenting on here, I saw countless recommendations about @tiana_john20 on Instagram so I had no options than to contact her so you know what,she proved her worth and cleared my doubts @tiana_john20 she is 100% legit 🤡🤡
*This guy uses his mouse with his left hand...*
Possibly the video is mirrored? I know some cameras do it by default as that's how you see yourself in the mirror.
LamayzePY Probably
Ask me again? Sir, I subscribed the channel at a glance. I love hacking the most.
Thanks!
Cyber_zest is the most accountable hacker i have came across during my quest to recover my lost instagram account
@@zestnelson9208 Hows the journey going xd? Also would you say this is for beginners
@@zestnelson9208 I’ve honestly seen several comments like this, I’d recommend you stop.
@@zestnelson9208 Upon further inspection, you have done this on every single video.